logo

Secure Usage of Mobile Application

   

Added on  2023-03-23

14 Pages2888 Words71 Views
Running head: SECURE USAGE OF MOBILE APPLICATION
Secure Usage of Mobile Application
Name of the student:
Name of the university:
Author Note:
Secure Usage of Mobile Application_1
1SECURE USAGE OF MOBILE APPLICATION
Table of Contents
1. Introduction............................................................................................................................2
2. Detailed working procedure...................................................................................................2
3. Assets at Risk.........................................................................................................................3
4. Threats....................................................................................................................................4
5. Controls..................................................................................................................................5
6. Security Objectives................................................................................................................6
7. Risk Evolution........................................................................................................................6
7.1 Risks with the device.......................................................................................................7
7.2 Risk with the network......................................................................................................8
7.3 Risk with the data centre..................................................................................................8
8. Testing with HSBC mobile banking application...................................................................8
9. Conclusion............................................................................................................................11
10. References..........................................................................................................................12
Secure Usage of Mobile Application_2
2SECURE USAGE OF MOBILE APPLICATION
1. Introduction
The report encompasses the technology of mobile application that is presently used by
the mobile developers for providing the enhanced interface for the usage of mobile devices.
This application is said to be a computer programs that are structured to run on the platforms
of mobile phone or tablet. The mobile application firstly intended to assist the user by
providing services like email, contact databases, calendars and many more. However, with
the growing trends in the need of the mobile applications led this industry to highly develop
user-defined software as well as this also incorporates certain vulnerabilities as well as threats
towards its users (Bhatnagar, Malik and Butakov, 2018). This report deals with the various
constraints regarding the security of the mobile application usage in a particular domain that
is banking applications and the potential mobile application of the HSBC mobile banking is
taken as an example for the testing purpose..
2. Detailed working procedure
This report deals with the security assessment analysis of the mobile baking
applications that are used by many users all around the world. The financial institutions
provide this banking service, which helps the customers to carry out the financial transaction
in an easy way as well as with the help of the remotely effective devices such as mobile
phones or tablets (Marforio et al., 2016). The detailed concept of the mobile banking
software may be depicted by the three concepts, which are meant to be interconnected with
each other. These are stated as accounting of mobile, brokerage of mobile and financial
information services with the implication of mobile. Most of the services regarding the
mobile banking are transaction based which requires a potential level of security for carrying
out the transactions. This mobile application accesses the server of the bank where each of
the data regarding the customers are critically saved. The account information regarding the
Secure Usage of Mobile Application_3
3SECURE USAGE OF MOBILE APPLICATION
customers as well as the account transactions are stated to be the active procedures within the
environment of banking facilities. These services also keeps a track of the investments that
are carried out by the customers within the environment of banks applications (He, Tian and
Shen, 2015). These transactions are carried out by secure payment gateways that are
embedded within the mobile application systems. The secure payment gateway provides an
access to the server networks of the bank thus adhering the various constraints of the
customers present in the bank.
3. Assets at Risk
The different assets that are subjected to risks within the environment of the banking
facilities that are offered by the mobile banking applications are stated as follows:
Data: This is stated as the most important asset regarding a mobile banking software, which
is used by each of the banking sectors to communicate or maintain a relationship of the
organization with the banks (Shahriar, Klintic and Clincy, 2015). The importance of this
asset is that it possess all the important requirements regarding the customers, which are very
important and should be restricted from the unknown users that are trying to access the data
of the customers.
Financial constraints: As customer always seeks to keep financial transactions with the
banking service providers the usage of the financial constraints are mainly focused by both
the servers as well as the customers (Yıldırım and Varol, 2015). The card as well as the loan
facilities availed by the customers within the mobile banking application is set to an asset that
might be at risk with the vulnerabilities, which might occur within the mobile banking
environment.
Other constraints: The mobile banking application that are used by the customers to
remotely access their bank services as well as to carry out the financial transactions.
Secure Usage of Mobile Application_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security
|10
|1529
|99

Mobile Payment Techniques Assignment
|6
|1097
|70

Implementation Strategy for ERP - Recommendations and Vulnerabilities
|1
|574
|287

Managing Innovation in Organization
|13
|2606
|21

Cyber Security Threats to HSBC Bank
|4
|824
|54

Realistic Mobile Commerce Application
|10
|1469
|82